[bitnami/valkey-cluster] Unify seLinuxOptions default value (#30322)

* [bitnami/valkey-cluster] Unify seLinuxOptions default value

Signed-off-by: David Gomez <dgomezleon@vmware.com>

* Update CHANGELOG.md

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

* Update README.md with readme-generator-for-helm

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

---------

Signed-off-by: David Gomez <dgomezleon@vmware.com>
Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
David Gomez
2024-11-08 15:41:35 +01:00
committed by GitHub
parent 7dee7dab2e
commit ec4be591f3
4 changed files with 14 additions and 10 deletions

View File

@@ -1,8 +1,12 @@
# Changelog
## 2.0.1 (2024-11-08)
* [bitnami/valkey-cluster] Unify seLinuxOptions default value ([#30322](https://github.com/bitnami/charts/pull/30322))
## 2.0.0 (2024-10-23)
* [bitnami/valkey-cluster] Update all the references from to master/slave to primary/replica ([#30025](https://github.com/bitnami/charts/pull/30025))
* [bitnami/valkey-cluster] Update all the references from to master/slave to primary/replica (#30025) ([e273ef7](https://github.com/bitnami/charts/commit/e273ef7b416321d485e586b9f69ddf12f5964fcb)), closes [#30025](https://github.com/bitnami/charts/issues/30025)
## <small>1.0.3 (2024-10-22)</small>

View File

@@ -33,4 +33,4 @@ name: valkey-cluster
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/valkey-cluster
- https://github.com/bitnami/containers/tree/main/bitnami/vakey-cluster
version: 2.0.0
version: 2.0.1

View File

@@ -420,7 +420,7 @@ OK
| `pdb.minAvailable` | Min number of pods that must still be available after the eviction. | `""` |
| `pdb.maxUnavailable` | Max number of pods that can be unavailable after the eviction. | `""` |
| `containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
| `containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
| `containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
@@ -476,7 +476,7 @@ OK
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `volumePermissions.containerSecurityContext.enabled` | Enable Containers' Security Context | `true` |
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `volumePermissions.containerSecurityContext.runAsUser` | User ID for the containers. | `0` |
| `volumePermissions.containerSecurityContext.privileged` | Run container as privileged | `false` |
| `volumePermissions.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` |
@@ -616,7 +616,7 @@ OK
| `metrics.podAnnotations` | Additional annotations for Metrics exporter pod | `{}` |
| `metrics.podLabels` | Additional labels for Metrics exporter pod | `{}` |
| `metrics.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
| `metrics.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `metrics.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `metrics.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
| `metrics.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
| `metrics.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
@@ -660,7 +660,7 @@ OK
| `sysctlImage.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `sysctlImage.mountHostSys` | Mount the host `/sys` folder to `/host-sys` | `false` |
| `sysctlImage.containerSecurityContext.enabled` | Enable Containers' Security Context | `true` |
| `sysctlImage.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
| `sysctlImage.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
| `sysctlImage.containerSecurityContext.runAsUser` | User ID for the containers. | `0` |
| `sysctlImage.containerSecurityContext.privileged` | Run privileged as privileged | `true` |
| `sysctlImage.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if sysctlImage.resources is set (sysctlImage.resources is recommended for production). | `nano` |

View File

@@ -235,7 +235,7 @@ pdb:
##
containerSecurityContext:
enabled: true
seLinuxOptions: null
seLinuxOptions: {}
runAsUser: 1001
runAsGroup: 1001
runAsNonRoot: true
@@ -449,7 +449,7 @@ volumePermissions:
##
containerSecurityContext:
enabled: true
seLinuxOptions: null
seLinuxOptions: {}
runAsUser: 0
privileged: false
## Container resource requests and limits
@@ -977,7 +977,7 @@ metrics:
##
containerSecurityContext:
enabled: true
seLinuxOptions: null
seLinuxOptions: {}
runAsUser: 1001
runAsGroup: 1001
runAsNonRoot: true
@@ -1140,7 +1140,7 @@ sysctlImage:
##
containerSecurityContext:
enabled: true
seLinuxOptions: null
seLinuxOptions: {}
runAsUser: 0
privileged: true
## Container resource requests and limits